25
215 REFERENCES Abbadi et. al., 2014, ―Image Encryption Based On Singular Value Decomposition‖ Journal of Computer Science, Vol. 10, No. 7 Page No. 1222-1230 Abomhara et. al., 2010, ―An Overview of Video Encryption Techniques‖, International Journal Of Computer Theory And Engineering, Vol. 2, No. 1, Page No.103-110 Abomhara et. al., 2010, ―Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard‖ International Journal Of Computer Theory And Engineering, Vol. 2, No. 2, Page No. 223-229 Aggarwal et. al., 2014, ―Design and Implementation of Video Encryption for Multimedia Applications‖, International Journal Of Engineering Research And Applications, Vol. 4 No. 2, Page No.29-34 Agi and Gong, 1996, ―An Empirical Study of Secure MPEG Video Transmissions‖, Proceedings of the 1996 Symposium on Network and Distributed System Security, Page No. 137 Agrawal et. al., 2012, Partial Encryption Algorithm for Secure Transmission of Multimedia Messages‖, International Journal On Computer Science And Technology, Vol. 3,No.1 Page No. 467-470 Agrawal et. al., 2012, A Fast and Secure Selective Encryption Scheme using Grid Division Method‖ International Journal Of Computer Applications, Vol. 51 No.4 Page No. 29-33 Al-Semari et. al., 1999, ―Improved Selective Encryption Techniques for Secure Transmission of MPEG Video Bitstreams‖, in Proceedings of the 1999 international Conference on image Processing (ICIP '99), Vol. 4. Page No. 256-260. Al-Asmari et. al. 2009, ―A Pyramid-Based Technique for Digital Color Images Copyright Protection,‖ International Conference on Computing, Engineering and Information, Page No. 44-47

REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

215

REFERENCES

Abbadi et. al., 2014, ―Image Encryption Based On Singular Value Decomposition‖

Journal of Computer Science, Vol. 10, No. 7 Page No. 1222-1230

Abomhara et. al., 2010, ―An Overview of Video Encryption Techniques‖,

International Journal Of Computer Theory And Engineering, Vol. 2, No. 1, Page

No.103-110

Abomhara et. al., 2010, ―Enhancing Selective Encryption for H.264/AVC Using

Advanced Encryption Standard‖ International Journal Of Computer Theory And

Engineering, Vol. 2, No. 2, Page No. 223-229

Aggarwal et. al., 2014, ―Design and Implementation of Video Encryption for

Multimedia Applications‖, International Journal Of Engineering Research And

Applications, Vol. 4 No. 2, Page No.29-34

Agi and Gong, 1996, ―An Empirical Study of Secure MPEG Video Transmissions‖,

Proceedings of the 1996 Symposium on Network and Distributed System Security,

Page No. 137

Agrawal et. al., 2012, ―Partial Encryption Algorithm for Secure Transmission of

Multimedia Messages‖, International Journal On Computer Science And Technology,

Vol. 3,No.1 Page No. 467-470

Agrawal et. al., 2012, ―A Fast and Secure Selective Encryption Scheme using Grid

Division Method‖ International Journal Of Computer Applications, Vol. 51 No.4

Page No. 29-33

Al-Semari et. al., 1999, ―Improved Selective Encryption Techniques for Secure

Transmission of MPEG Video Bitstreams‖, in Proceedings of the 1999 international

Conference on image Processing (ICIP '99), Vol. 4. Page No. 256-260.

Al-Asmari et. al. 2009, ―A Pyramid-Based Technique for Digital Color Images

Copyright Protection,‖ International Conference on Computing, Engineering and

Information, Page No. 44-47

Page 2: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

216

Ali et. al. 2012, ―Digital Image Watermarking Basics, and Hardware

Implementation‖, International Journal of Modeling and Optimization, Vol. 2, No. 1,

Page No. 19-24

Armbrust et. al. 2010, ―A View of Cloud Computing‖. Communications of the ACM

Vol. 53, No. 4, Page No. 50–58

Ashraf and Chong, 1997, ―Performance analysis of H.261 and H.263 video coding

algorithms‖. Proceedings of the 1997 IEEE International Symposium on Consumer

Electronics, Page No. 153-156.

Atul and Alexandros, 1998, ―MPEG-4: An object-based multimedia coding standard

supporting mobile applications‖. Mobile Networks Applications, Vol.3, Page No. 5-

32.

Aung et. al., 2014, ―A Novel Secure Combination Technique of Steganography and

Cryptography‖ International Journal of Information Technology, Modeling and

Computing (IJITMC), Vol. 2, No. 1, Page No. 55-62

Ayele et. al., 2012 ―Review of Proposed High Efficiency Video Coding (HEVC)

Standard‖ International Journal of Computer Applications, Vol. 59 No.15 Page No. 1-

9

Bamane et. al. 2013, ―Hybrid Video Watermarking Technique By Using DWT &

PCA‖, International Journal Of Electronics And Communication Engineering &

Technology, Vol. 4, No. 2 Page No. 172-179

Basheera et. al., 2013, ―Distortion Free Fragile Watermarking Technique For

Medical Images‖ International Journal of Computer Science Engineering and

Information Technology Research, Vol. 3 No. 2, Page No. 187-192

Bhargava, Shi and Wang, 2004 "MPEG video encryption algorithms", Multimedia

Tools Applications, Vol. 24, no. 1, Page No. 57 -79

Bhattacharya et. al., 2006, ―Survey on Different Video Watermarking Techniques

and Comparative Analysis with Reference to H.264/AVC‖, IEEE, 1-4244-0216-6

Page 3: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

217

Berna, et. al. 1998, ―The H.263+ video coding standard: Complexity and

performance‖ Proceedings of the Data Compression Conference, Page No. 259-268.

Bernd et. al., 1995, ―Comparison of the H.263 and H.261 video compression

standards‖ SPIE Proceedings Standards Common Interfaces Video Information

System, CR60: Page No. 233-251

Bisdikian et. al., 1995, ―Issues on movie allocation in distributed Video-on-Demand

systems‖. In Proceedings of the IEEE ICC, Page No. 250-255

Bisla et. al., 2013, ―Comparative Study of DWT and DWT-SVD Image

Watermarking Techniques‖ International Journal Of Advanced Research In Computer

Science And Software Engineering, Vol. 3 No.6, Page No. 821-825

Brubeck et. al. 1996, ―Hierarchical storage management in a distributed VoD

system‖ IEEE Multimedia, Page No. 37-47

Burman et. al., 2013, ―Histogram Based Color Image Authentication By Digital

Image Watermark Technique‖, International Journal Of Engineering Research And

Applications ISSN: 2248-9622 Vol.3 No. 4.Page No. 321-326

Cao et. al., 2013, ―QoS-aware Virtual Machine Scheduling for Video Streaming

Services in Multi- Cloud‖, TST, Vol. 18 No 1

Cha et. al., 2012, ―Design of StraaS (Streaming as a Service) based on Cloud

Computing‖ International Journal of Multimedia and Ubiquitous Engineering, Vol.

7, No. 4, Page No.187-200

Chakravarthy et. al., 2014, ―A Three Way Reversible Encipherment Mechanisms

for Robust Video Data Hiding Using Selective Embedding and Forbidden Zone Data

Hiding‖, International Journal Of Computer Science And Information Technologies,

Vol. 5 No.1,Page No. 873-875

Chandra et. al., 2012, ―A Novel Approach of Digital Video Encryption‖

International Journal Of Computer Applications, Vol. 49 No.4, Page No. 38-42

Page 4: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

218

Chang et. al., 2001, ―Overview of the MPEG-7 standard‖ IEEE. Trans. Circ. Syst.

Video Technol., Vol. 11, Page No. 688-695.

Chen et. al., 2007, ―On the Design of Perceptual MPEG-Video Encryption

Algorithms‖ IEEE Transactions on Circuits And Systems For Video Technology, Vol.

17, No. 2, Page No. 214-223

Chen et. al, 2014, ―Efficient Compression-Jointed Quality Controllable Scrambling

Method for H.264/SVC‖ International Journal of Network Security, Vol.16, No.6,

Page No. 541-548

Cheng, 2000, ―Partial encryption of compressed images and video‖, IEEE Trans,

Signal Processing, Vol. 48 No. 8, Page No. 2439-2451

Chow et. al. 2009, ―Controlling Data in the Cloud: Outsourcing Computation without

Outsourcing Control‖. In Proceedings of ACM workshop on Cloud computing

security

Cox,et. al., 1999, ―Watermarking as Communications with Side Information,‖ Proc.

of the IEEE, Vol. 87 No. 7, Page No. 1127-1141

Cox et. al., 1997, ―Secure spread spectrum watermarking for multimedia‖, IEEE

transactions on image processing, Vol. 6, Page No. 1673-1687

Dandamwar et. al., 2012, ―Introduction to Real Time & Secure Video Transmission

using Distributed & Parallel Approach‖ International Journal of Computer Science

and Network, Vol. 1 No. 5

Darmstaedter et. al., 1998, ―A block based watermarking technique for MPEG-2

signals: Optimization and validation on real digital TV distribution links‖,

Proceedings 3rd European Conference on Multimedia Applications, Services and

Techniques, Page No. 190-206

Deguillaume et. al., ―Robust 3D DFT video watermarking‖, Proceedings of the SPIE,

Vol. 3657, Page No. 113-124.

Page 5: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

219

Dhande et. al., 2014, ―Hide Inside-Separable Reversible Data Hiding in Encrypted

Image‖, International Journal Of Innovative Technology And Exploring Engineering,

Vol.3 No.9 Page No. 88-91

Díaz et. al. 2007, ―Evaluating video streaming over GPRS/UMTS networks: a

practical case‖, in: The 65th IEEE Vehicular Technology Conference. VTC IEEE

Computer Society, Page No. 624–628.

Duan et. al., 2012, ―Benefits And Drawbacks Of Cloud-Based Versus Traditional

ERP Systems‖ Proceedings of the 2012-13course on Advanced Resource Planning

Ducheneaut et. al., 2008, ―Social TV: Designing for distributed, sociable television

viewing,‖ International Journal Human-Computing Interaction, Vol. 24, No. 2, Page

No. 136– 154

Durdi et. al., 2013, ― Robust Video Transmission over Wireless Networks Using

Cross Layer Approach‖ Journal of Industrial and Intelligent Information Vol. 1, No.

2, Page No. 97-101

Elkilani, et. al., 2009, ―Performance of Encryption Techniques for Real Time Video

Streaming‖ IEEE Proceeding, 978-1-4244-3778-8, Page No. 130-134

Ely 1995, ―MPEG Video coding- A simple Introduction‖ in EBU Technical Review

Winter

Eskicioglu . et. al., 2003, ―Selective encryption of multimedia content in distribution

networks: Challenges and new directions‖, Proceedings of the IASTED International

Conference on Communications, Internet and Information Technology (CIIT 2003).

Scottsdale, AZ: ACTA Press.

Feng, et. al., 2012, "A theory of cloud bandwidth pricing for video-on-demand

providers," in IEEE Infocom

Fong et. al, 2009, ―On Improving the Lightweight Video Encryption Algorithms for

Real-Time Video‖ Third International Conference on Communications and

Networking

Page 6: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

220

Gaeta et al., 2013, “StreamSmart: P2P Video Streaming for Smartphones Through

The Cloud‖, Vol. 60. In SECON

Goel et. al., 2013, ―Cloud-Based Mobile Video Streaming Techniques‖ International

Journal of Wireless & Mobile Networks, Vol. 5, No. 1, Page No. 85-92

Goel et. al., 2012, ―Cloud-Based Mobile Video Streaming Techniques‖ Global

Journal of Computer Science and Technology, Vol. 12 No 17, Page No. 47-51

Govinda et. al., 2013, ―On-Demand Secure Streaming of Multimedia Data over

Cloud‖, International Journal of Engineering and Technology, Vol. 5 No 3, Page No.

2101-2107

Goyal et. al., 2011, ―Secure Video Multimedia Communication over Networks‖,

Proceeding of Conference on, SDCN.

Griwotz et. al., 1998, ―Protecting VoD the easier way," in Proceedings of Multimedia

and Security Workshop at the 6th ACM International Multimedia Conference, Page

No. 21-28

Guleria et. al., 2013, ―To Enhance Multimedia Security In Cloud Computing

Environment Using Crossbreed Algorithm‖ International Journal Of Application or

Innovation in Engineering & Management , Vol. 2, No 6, Page No. 562-568

Gulistan and Muhammad, 2004, ―Performance comparison of advanced video

coding h.264 standard with baseline H.263 and H.263+ standards‖, IEEE International

Symposium Communication Information Technology, Vol. 2, Page No. 743-746.

Gupta et. al., 2013, ―An Enhanced Security Technique for Storage of Multimedia

Content over Cloud Server‖ International Journal Of Engineering Research And

Applications, Vol. 3, No. 4, Page No. 2273-2277

Gupta et. al., 2012, ―Mobile Cloud Computing: The Future of Cloud‖ International

Journal Of Advanced Research In Electrical, Electronics And Instrumentation

Engineering, Vol. 1No. 3, Page No. 134-145

Page 7: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

221

Habib et. al., 2006, ―Encryption of MPEG Video Streams‖, IEEE Region 10

Conference TENCON

Hada et. al., 2011, ―Security Agents: A Mobile Agent based Trust Model for Cloud

Computing‖, International Journal Of Computer Applications, Vol. 36 No.12, Page

No. 12-15

Harish et. al., 2013, ―Hybrid Robust Watermarking Technique Based on DWT, DCT

and SVD‖ International Journal of Advanced Electrical and Electronics Engineering,

Vol. 2 No 5, Page No. 137-143

Hartung et. al., 1999, ―Multimedia Watermarking Techniques‖, Proceedings of the

IEEE, Vol. 87, No. 7, Page No. 1078-1107

Hartung, et. al. 1999, "Spread spectrum watermarking: Malicious attacks and

counterattacks", Proceedings. SPIE, Vol. 3657, Page No.147 -158

Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid

Domain‖ International Journal Of Computer Science Issues , Vol. 9, Issue 6, Page

No. 109-114

Hoecker et. al., 2013 ―An on-demand scaling stereoscopic 3D video streaming

service in the Cloud‖ Journal of Cloud Computing, Springer Open Journal

Hooda et. al., 2012, ―A Comprehensive Survey of Video Encryption Algorithms‖,

International Journal Of Computer Applications, Vol. 59 No.1 Page No. 14-19

Hovančák, 2008, ―Steganography Based On DWT Transform‖, Department of

Electronics and Multimedia Telecommunications, Technical University of Košice,

Slovak Republic, Transmission, IEEE Xplore

Huang, et. al. 2011, "CloudStream: Delivering High-Quality Streaming Videos

through a Cloud-Based SVC Proxy," in IEEE INFOCOM Mini-Conference

Huang et. Al., 2008, ―Challenges, Design and Analysis of a Large-scale P2P-VoD

System‖ In Proc. of ACM SIGCOMM

Page 8: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

222

Ismail et. al., 2014―Selective Video Encryption System using AES (Rijndael)

Algorithm for Low Cost FPGA Chip‖ Recent Advances in Computer Engineering,

Communications and Information Technology, ISBN: 978-960-474-361-2, Page No.

318-323

Jenifer et. al., 2014, ―LSB Approach for Video Steganography to Embed

stenography to Embed Images‖ International Journal Of Computer Science And

Information Technologies, Vol. 5 No.1, Page No. 319-322

Jenisch et. al., 2014, ―A detailed evaluation of format-compliant encryption methods

for JPEG XR-compressed images‖ EURASIP Journal on Information Security, Vol. 6

Jeremiah 2004, ―Comparing media codecs for video content‖ Proceedings of the

Embedded Systems Conference, (ESC`04), San Francisco, Page No. 1-18.

Jian et. al. 2004, ―A Novel Chaos-Based Video Encryption Algorithm. Proc. of Trim

Size‖: 9in x 6in,

Jian-Wen, et. al. 2006, ―Introduction to H.264 advanced video coding‖, Proceedings

of the Asia and South Pacific Conference on Design Automation, IEEE Press Page

No. 736-741.

Jigisha et. al., 2013, ―A Hybrid DWT-SVD Method For Digital Video

Watermarking‖ International Journal Of Advanced Research In Computer And

Communication Engineering, Vol. 2 No. 7, Page No. 2771-2775

Joshi et. al., 2014, ―MV Compensation Attack on fast Selective Video Encryptions‖,

International Journal of Computational Engineering Research, Vol. 4, No. 1 Page No.

32-38

Kala et. al., 2011, ―Enhanced Selective Encryption Algorithm For Wireless Ad Hoc

Networks‖ International Journal Of Computing Technology And Information

Security, Vol.1, No.2, Page No.48-51

Page 9: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

223

Kanrar et. al., 2012, ―Analysis and implementation of the Large Scale Video-on-

Demand System‖ International Journal of Applied Information Systems, Vol. 2

No.2, Page No. 1-9

Kapadia, et. al. 2010, "Secure cloud computing with brokered trusted sensor

networks", International Symposium on Collaborative Technologies and Systems

(CTS), Page No..581-592.

Karel, 1996, ―H.263: Video Coding for Low-Bit-Rate Communication‖, IEEE

Communication Magazine. Vol. 34, Page No. 42-45.

Karpe et. al., 2013, ―Hybrid Digital Video Watermarking based on DWT-PCA‖

International Journal of Advance Research in Computer Science and Management

Studies, Vol. 1 No., Page No. 118-127

Kaur et. al., 2013, ―Comparative Analysis and Implementation of Image Encryption

Algorithms‖ International Journal Of Computer Science And Mobile Computing, Vol.

2, No.4, Page No. 170-176

Kedia et. al., 2013, ―Non Blind Multiplicative Watermarking using 2D-DWT‖.

International Journal Of Emerging Technology And Advanced Engineering, Vol. 3,

No. 6, Page No. 453-457

Kekre et. al., 2014, ―Robust Watermarking Technique using Hybrid Wavelet

Transform Generated Kekre Transform And discrete Cosine Transform‖,

International Journal of Scientific and Research Publications, Vol. 4 No. 2 Page No.

1-13

Khalil et. al., 2014, ―Cloud Computing Security: A Survey‖ Computers, Vol. 3, Page

No. 1-35

Kharb et. al., 2011, ― A Fast Selective Video Encryption Using Alternate Frequency

Transform‖ International Journal Of Innovative Technology & Creative Engineering,

VOL.1 NO.2 Page No. 51-59

Page 10: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

224

Kosta, et. al., 2012, ―Thinkair: Dynamic resource allocation and parallel execution in

the cloud for mobile code offloading,‖ in Proceedings IEEE INFOCOM

Kovachev et. al., 2011, "Mobile Cloud Computing: A Comparison of Application

Models," CoRR, vol. abs/1107.4940

Kulkarni et. al., 2013, ―Proposed Video Encryption Algorithm v/s Other Existing

Algorithms: A Comparative Study‖ International Journal Of Computer Applications,

Vol. 65 No.1, Page No. 1-5

Kumar et. al., 2011, ―Real time Video Streaming using Novel approach‖

International Journal of Computer Applications, Number 8 (ISBN: 978-93-80866-66-

3), Page No. 1-8

Kumar et. al., 2011, ―Non-Blind Image Watermarking Using Contourlet Transform‖,

Indian Journal Of Computer Science And Engineering, Vol. 2 No. 1, Page No. 31-38

Kumar et. al., 2012, ― An Enhanced and Effective Encrypting Algorithm for High

Volume Video Data Streaming Application on MANET‖ IJCA, International

Conference on Recent Advances and Future Trends in Information Technology, Page

No. 9-12

Kutte et. al., 2000, ―The Watermark Copy Attack‖, Proceedings of SPIES, Security

and Watermarking of Multimedia Content II, Vol 3971, Page No. 1-10

Lamba et. al., 2011, ―Cloud Computing-Future Framework for E-management of

NGO's‖ International Journal Of Advancements In Technology, Vol. 2, No 3 Page

No. 400-407

Lanjewar et. al., 2013, ―A Survey on Peer to Peer sharing using Cloud Based Mobile

Social TV (Cloud MoV)‖ International Journal of Research in Computer and

Communication Techno, Vol. 3 No 2. Page No. 236-240

Lavanya et. al., 2011, ―Cloud Based Video on Demand Model With Performance

enhancement‖, Malaysian Journal of Computer Science, Vol. 24 No. 2, Page No. 73-

83

Page 11: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

225

Li et. al., 2009, ―Layered Encryption for Scalable Video Coding‖ IEEE Proceeding,

978-1-4244-4131-0

Li et. al., 2011 ―Cost-effective Partial Migration of VoD Services to Content Clouds‖,

IEEE 4th International Conference on Cloud Computing, 978-0-7695-4460-1/11 Page

No. 203-210

Lian et. al., 2009, ―Recent Advances in Multimedia Information System Security‖,

Informatica Vol 33, Page No. 3-24

Lin et. al., 2014, ―A Novel SVD-based Watermarking Scheme for Protecting Rightful

Ownership of Digital Images‖, Journal Of Information Hiding And Multimedia Signal

Processing, Vol. 5 No. 2, Page No. 124-143

Lint, et. al., 2009, ―An Overview of Security Issues in Streaming Video‖ IEEE

Proceedings, 0-7695-1062-0, Page No. 345-348

Liu et. al., 2005, ―A Novel Encryption Algorithm for High Resolution Video‖,

NOSSDAV’05, ACM 1-58113-987-X

Liu, et. al., 2011 "Novasky: Cinematic-Quality VoD in a P2P Storage Cloud," In

IEEE INFOCOM

Liu et. al., 2003, ―Selective Encryption of Multimedia Content in Distributed

Networks: Challenges and New Directions‖, presented at IASTED International

Conference on Communications, Internet and Information Technology

Lookabaugh et al., 2003, ―Selective encryption of MPEG-2 video," in Proceedings

of the SPIE Multimedia Systems and Applications VI

Lookabaugh et. al. 2004, "Selective encryption for consumer applications," IEEE

Communications Magazine, vol. 42, No. 5, Page No. 124-129

Maadeed et. al., 2012, ―A New Chaos-Based Image-Encryption and Compression

Algorithm‖ Journal of Electrical and Computer Engineering, Hindawi Publishing

Corporation, Vol. 2012, Page No. 1-11

Page 12: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

226

Maggiani, 2009, ―Cloud Computing Is Changing How We Communicate‖, In IEEE

978-1-4244-4358-1/09

Mallika et. al., 2014, ―Joint Video Compression And Encryption Using Secure

Wavelet Transform And Entropy Coding‖ International Journal Of Computer Science

And Mobile Computing, Vol.3 No. 2, Page No. 483-489

Mandavgane et. al., 2014, ―Quality Assessment of Precodec Video Protection‖

International Journal of Advance Research in Computer Science and Management

Studies, Vol. 2, No 1 Page No. 264-268

Mane et. al., 2013, ―Review Paper on Video Watermarking Techniques‖,

International Journal of Scientific and Research Publications, Vol. 3No 4, Page No. 1-

5

Manikandan et. al., 2012, ―Watermarking Techniques‖, International Journal Of

Computers & Technology, Volume 2 No. 3, Page No. 122-124

Mao et. al. 2013 ,."A survey of mobile cloud computing for rich media applications",

IEEE Wireless Comm., Vol. 20, No. 3, Page No. 46-53

Marcel et. al. 1997, ―Low-bitrate video coding based upon geometric

transformations‖ Proceeding of the pro RISC Work on Circuits, System and Signal

Processing, Page No. 561-568

Margaret et. al., 2012, ―Reversible Data Hiding In Encrypted Images by XOR

Ciphering Technique‖ International Journal Of Advanced Research In Electrical,

Electronics And Instrumentation Engineering, Vol. 3, Issue 2, Page No. 7287-7293

Masoumi et. al., 2014, ―Content Protection in Video Data Based on Robust Digital

Watermarking Resistant to Intentional and Unintentional Attacks‖, International Arab

Journal of Information Technology, Vol. 11, No. 2 Page No. 204-212

Massoudi et. al., 2008, ―Overview on Selective Encryption of Image and Video

Challenges and Perspectives‖, EURASIP Journal on Information Security, Hindawi

Publishing Corporation Volume 2008, Page No. 1-18

Page 13: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

227

Mee-Hey, et. al. 1998, ―A study on the integration and synchronization of video

image using H.261 in polysomnography‖ Eng. Med. Biol. Soc., Proceedings 20th

Annual. International Conference IEEE, Vol. 4, Page No. 1960-1963.

Meyer et. al., 1995, ―Security Mechanisms for Multimedia Data with the Example

MPEG-1 Video‖, Project Description of SECMPEG

Mobasseri, 1998, ―Direct sequence watermarking of digital video using m-frames,‖

Proceedings International Conference on Image Processing (ICIP-98), Vol. 3, Page

No. 399-403

Mohan et. al., 2014, ―Secured Robust Video Data Hiding Using Symmetric

Encryption Algorithms‖, International Journal of Innovative Research in Engineering

& Science, Vol. 1, No. 3, Page No. 17-29

Moideen et. al., 2014, ―A Novel Method for Data Hiding In Encrypted Image And

Video‖, International Journal Of Emerging Technology And Advanced Engineering,

Vol. 4 No. 2 Page No. 538-542

More et. al., 2014, ―Efficient TIMG Algorithm for Secure Transmission of Data‖

special issue of International Conference on Advances in Engineering & Technology,

IOSR Journal of Computer Science (IOSR-JCE) , Page NO 43-46

Morris, 1995, ―MPEG-2: where did it come from and what is it?‖, Proceedings of the

IEE Colloquium on MPEG-2- What it is and What it isn`t, Page No. 1-5

Mosbah et. al., 2013, ―Current Services In Cloud Computing: A Survey‖

International Journal of Computer Science, Engineering and Information Technology,

Vol.3, No.5, Page No. 1-8

Mukhopadhyay et. al. 2013, ― Enhanced Security for Cloud Storage using File

Encryption‖

Naderi et. al., 2012, ―Image Encryption Using a Lightweight Stream Encryption

Algorithm‖ Advances in Multimedia, Hindawi Publishing Corporation Vol. 2012, No.

08 Page No. 1-11

Page 14: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

228

Nanjunda et. al., 2005, ―Robust Encryption for Secure Image Transmission over

Wireless Channels‖ Proceedings IEEE International Conference Communications,

Vol. 2, pp.1287 -1291

Nehete et. Al. 2003, ―A Real-time MPEG Video Encryption Algorithm using

AES",NCC

Nithyabharathi et. al., 2014, ―To Enhance Multimedia Security in Cloud Computing

Environment Using RSA and AES‖, International Journal of Science, Engineering

and Technology Research, Vol. 3, No. 2, Page No. 341-345

Niu, et. al. 2012, ―Quality-Assured Cloud Bandwidth Auto-Scaling for Video-on-

Demand Applications‖. IEEE Infocom

Pallickara, et. al. 2009, “Granules: A Lightweight, Streaming Runtime for Cloud

Computing With Support for Map-Reduce‖. In: IEEE International Conference

Payberah, 2013, ―Live Streaming in P2P and Hybrid P2P-Cloud Environments for

the Open Internet,‖ Ph.D. dissertation, KTH

Peerzada et. al., 2014, ―An Analytical Review of the Multimedia Data and

Encryption Mechanism at Cloud Server‖ International Journal of Innovative Research

in Computer and Communication Engineering, Vol. 2, No. 2, Page No. 3341-3348

Podesser et. al., 2002, ―Selective Bitplane Encryption for secure Transmission Of

Image Data In Mobile Environments‖ CD-ROM Proceedings of the 5th IEEE Nordic

Signal Processing Symposium (NORSIG 2002), 2002

Poongodi et. al., 2014, ―The Transmission of Image and Data Through Video Signal

Using Wavelet Transform‖ International Journal of Innovative Research in Science,

Engineering and Technology, Vol. 3, No. 4 Page No. 11345-11349

Prabhu et. al., 2014, ―User Behaviour Prediction Based Adaptive Mobile Video

Streaming and Efficient Social Video Sharing in the Clouds‖, International Journal of

Innovative Research in Computer and Communication Engineering, Vol.2 No. 1

Page 15: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

229

Qiao and Nahrstedt, 1997, “A new algorithm for MPEG video encryption‖ In Proc.

of First International Conference on Imaging Science System and Technology, Page

No. 21–29

Qiao and Nahrstedt, 1998, "Comparison of MPEG encryption algorithms"

International Journal of Computer Graphics., Special Issue on Data Security in Image

Communications and Networks, Vol. 22, No. 3

Qiu et. al., 2013, ―A hybrid watermarking scheme for H.264/AVC video‖ IEEE

Computer Society, Proceedings of the 17th International Conference on Pattern

Recognition

Qiu et. al., 2004, ―A hybrid watermarking scheme for H.264/AVC video‖ IEEE,

Proceedings of the 17th International Conference on Pattern Recognition, 1051-

4651/04

Ragab et. al., 2014, ―Encryption Quality Evaluation of Robust Chaotic Block Cipher

for Digital Imaging‖ International Journal Of Recent Technology And Engineering,

Vol. 2 No.6, Page No. 4-9

Rahman et. al., 2013, ―A DWT, DCT and SVD Based Watermarking Technique to

Protect The Image Piracy‖, International Journal Of Managing Public Sector

Information And Communication Technologies, Vol. 4, No. 2, Page No. 21-32

Rajagopal et. al., 2013, ―A Survey of Video Encryption Algorithms Implemented In

Various Stages of Compression‖, International Journal Of Engineering Research &

Technology, Vol. 2 No.2, Page No. 1-12

Raju, et. al. 2008, "A Novel Video Encryption Technique based on Secret Sharing",

Proceedings of International Conference on image Processing Page No. 3136-3139,

Raju et. al. 2008, "A Real-Time Video Encryption Exploiting the Distribution of the

DCT coefficients," TENCON-IEEE Region 10 Conference

Page 16: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

230

Raju et. al., 2008, ―Fast and Secure Real-Time Video Encryption‖, IEEE Computer

Society, Sixth Indian Conference on Computer Vision, Graphics & Image Processing,

978-0-7695-3476-3 Page No. 257-263

Ramzan et. al. 2012, ―Video streaming over P2P networks: Challenges and

opportunities‖, Image Communication, Vol. 27 No. 5, Page No. 401--411

Rao et. al., 2014, ―A Smart Intelligent Way of Video Authentication Using

Classification and Decomposition of Watermarking Methods‖, International Journal

Of Computer Trends And Technology, Vol. 10 No. 3, Page No. 136-142

Reddy et. al., 2014, ―The Indexing Algorithm for Scrambled Frames in Video

Encryption‖, International Journal Of Advanced Research In Computer Science And

Software Engineering, Vol. 4 No. 2, Page No. 651-655

Redmill et. al. 2007, ―A novel secure H.264 transcoder using selective

encryption‖. IEEE IV-85 - IV-88.

Reilly et. al., 2011, ―Cloud Computing: Pros and Cons for Computer Forensic

Investigations‖ International Journal Multimedia and Image Processing, Vol. 1No.1

Page No. 26-34

Riad et. al., 2013, ―A Framework for Cloud P2P VoD System based on User's

Behavior Analysis‖ International Journal Of Computer Applications, Vol. 76 No.6

Page No. 20-26

Roden, 1996, ―H.261 and MPEG1-a comparison‖, Proceedings of the IEEE 15th

Annual International Conference, Page No. 65-71

Rong et. al., 2012 ―A Secure Data Access Mechanism for Cloud Tenants‖,

Proceeding of the Third International Conference on Cloud Computing, GRIDs, and

Virtualization, ISBN: 978-1-61208-216-5, Page No. 113-119

Salleh, 2003, “Image encryption algorithm based on chaotic mapping‖. Journal

Teknologi, 39(D) Page No. 1–12

Page 17: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

231

Sandhu et. al., 2013, ―An Approach to Enhanced Security of Multimedia Data Model

Technology Based on Cloud Computing‖ International Journal Of Advanced

Research In Computer Science And Software Engineering, Vol. 3, No 7, Page No.

724-728

Saranya et. al., 2011, ―A H.264 based Selective Video Encryption for Mobile

Applications‖ International Journal of Computer Applications, Volume 17– No.4,

Page No. 21-25

Sathik et. al., 2012, ―Authentication of Digital Images by using a semi-Fragile

Watermarking Technique‖, International Journal Of Advanced Research In Computer

Science And Software Engineering ,Vol. 2, No. 11, Page No. 39-44

Satyanarayanan et. al. 2009, ―The case for VM-based Cloudlets in mobile

computing,‖ IEEE Pervasive Comput., Vol. 8, Page No. 14–23

Schatz et. al., 2007, ―Mobile TV becomes social – Integrating content with

communications,‖ in Proceedings. ITI

Shah et. al., 2011 ―Video Encryption: A Survey‖, International Journal Of Computer

Science Issues, Vol. 8, Issue 2 Page No. 525-534

Shahid et. al., 2010, ―Over the Real-Time Selective Encryption Of AVS Video

Coding Standard‖, EUSIPCO'10: 18th European Signal Processing Conference,

Aalborg : Denmark

Shahid et. al., 2010, ―Selective Encryption Of C2DVLC Of AVS Video Coding

Standard For I & P Frames‖, IEEE Proceedings, 978-1-4244-7493-6

Shamily et. al., 2012, ―A Review on Multimedia Cloud Computing, its Advantages

and Challenges‖ International Journal Of Advanced Research In Computer

Engineering & Technology, Vol. 1No. 10, Page No. 130-133

Sharma et. al., 2012, ―DWT-SVD Based Efficient Image Watermarking Algorithm

to Achieve High Robustness and Perceptual Quality‖, International Journal Of

Page 18: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

232

Advanced Research In Computer Science And Software Engineering, Vol. 2 No. 4,

Page No. 75-78

Sharma et. al. 2014, ―Performance analysis of video formats encoding in cloud

environment. IOSR Vol. 56 Page No. 73-78

Shi, Wang, and Bhargava, 1999, ―MPEG Video Encryption in Real-Time Using

Secret key Cryptography,‖ International Conference on Parallel and Distributed

Processing Techniques and Applications

Shi. and Bhargava, 1998, ―A Fast MPEG Video Encryption Algorithm,‖

Proceedings of the 6th International Multimedia Conference

Shunmugapriya et. al., 2014, ―Multimedia Security With Multi Agent System‖

Australian Journal of Basic and Applied Sciences Vol. 8 No. 3, Page No. 120-125

Sikora et. al. 1995, ―Digital Video Coding Standards and Their Role in Video

Communications‖, Proceedings of the IEEE Vol. 83, Page No. 907-923

Sikora, "The MPEG-1 and MPEG-2 Digital Video Coding Standards", IEEE Signal

Processing Magazine

Sikora, 1999, ―Digital Video Coding Standards and Their Role in Video

Communications‖ In: Signal Processing for Multimedia, Page No. 225.

Sikora, 1997, ―MPEG digital video-coding standards‖, MPEG Digital Video-Coding

Standards, Vol. 14, Page No. 82-100.

Singh et. al., 2011, ―Fast Random Bit Encryption Technique for Video Data‖,

European Journal of Scientific Research, Vol.64 No.3 Page No. 433-445

Singh et. al., 2011 ―A Survey on Joint Compression and Encryption Techniques for

Video Data‖, Journal Of Computer Science, Vol. 8 No.5, Page No. 731-736

Sinha et. al., 2011, ―Digital Video Watermarking using Discrete Wavelet Transform

and Principal Component Analysis‖, International Journal of Wisdom Based

Computing, Vol. 1 No. 2, Page No. 7-12

Page 19: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

233

Sivakami et. al., 2014 ―A Digital Watermarking System For Video Authentication

Using The DCT‖ International Journal Of Engineering Research & Technology, Vol.

01, Page No. 22-33

Slagell et. al. 2004, ―Known-Plaintext Attack Against a Permutation Based Video

Encryption Algorithm‖ Available http://eprint.iacr.org/2004/011.pdf .

Socek et. al. 2006, ―A Permutation-based Correlation- Preserving Encryption Method

for Digital Videos," in International Conference on Image Analysis and Recognition,

LNCS 4141, Page No.547-558.

Socek et. al. 2003, ―Cryptanalysis of Video Encryption Algorithms,‖ to appear in

Proceedings of The 3rd Central European Conference on Cryptology TATRACRYPT

Sona et. al., 2013,―A Survey On Efficient Video Sharing And Streaming In Cloud

Environment Using VC‖, International Journal of Innovative Research in Computer

and Communication Engineering ,Vol. 1,No.8, Page No. 1775-1780

Spanos and Maples, 1995, ―Performance Study of a Selective Encryption Scheme

for the Security of Networked, Real-time Video,‖ Proceedings of 4th International

Conference on Computer Communications and Networks

Su et. al., ―A novel approach to collusion-resistant video watermarking‖, Proceedings

of the SPIE, vol. 4675, Page No. 491-502.

Sulong, 2012, ―A New Color Image Watermarking Technique Using Hybrid

Domain‖, International Journal of Computer Science Issues, Vol. 9, Issue 6, No 1,

Page No. 109-114

Sullivan et.al., 2012, ―Overview of the High Efficiency Video Coding(HEVC)

Standard ‖ IEEE Transactions On Circuits And Systems For Video Technology, Vol.

22, No. 12 Page No. 1649-1668

Sullivan, and Wiegand, 2005, ―Video compression from concepts to the H.264/AVC

standard‖, Proceeding IEEE, Page No. 18-31

Page 20: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

234

Suryadi et. al., 2012 ―Enhancement of Video Encryption Algorithm Performance

Using Finite Field Z2 3-Based Chaotic Cipher‖, Journal Of Communication And

Computer, Vol. 9 Page No.960-964

Swanson, et. al., 1997, ‖Object- Based Transparent Video Watermarking,‖

Proceedings IEEE Signal Processing Society, Workshop on Multimedia Signal

Processing

Tang, 1996, ―For encrypting and decrypting MPEG video data efficiently‖, in

Proceedings of The Fourth ACM International Multimedia Conference, Page No. 219-

230.

Thapa et. al. 2011, ―On Secure Digital Image Watermarking Techniques‖ Journal of

Information Security, Vol. 2, Page No. 169-184

Tong et. al., 2012, ―Layered Video Encryption Utilizing Error Propagation in

H.264/AVC‖ EEESYM IEEE Symposium on Electrical & Electronics Engineering,

978-1-1673-2365-9, Page No. 182-187

Tosun et. al., 2001, ―On Error Preserving Encryption Algorithms for Wireless Video

Transmission‖, Proceedings of the ninth ACM international conference on

Multimedia, September 30-October 05, 2001, Ottawa, Canada

Um et. al., 2006, ―Selective Video Encryption Of A Distributed Coded Bitstream

Using LDPC Codes‖, Proceeding of SPIE-IS&T Electronic Imaging, SPIE Vol. 6072,

60721B Vol.1

Van et. al., 2005, ―A Model-Based Analysis of Secure Video Transmission Based on

IPSec and IPv4‖, Electronics & Telecommunications Research Institute Journal,

Volume 27, No. 2 Page No. 219-222

Vassaux, et. al. 2002 ―Scrambling technique for video object watermarking resisting

to MPEG-4,‖ Proceedings Video/Image Processing and Multimedia Communications

4th EURASIP-IEEE Region 8 International Symposium on VIPromCom, Page No.

239-244

Page 21: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

235

Veerasamy et. al., 2014, ―Video Watermarking using Wavelets‖, International

Journal of Research in Engineering & Advanced Technology, Vol. 1 No.6, Page No.

1-6

Vijayalakshmi et. al., 2014, ―Data Encryption hiding technique in non-standard

cover files‖ International Journal of Advanced Research in Computer Science &

Technology Vol. 2 No.1, Page No. 55-59

Wang et. al., 2013, "Adaptive Mobile Cloud Computing to Enable Rich Mobile

Multimedia Applications", IEEE Transactions on Multimedia, Vol. 15, N.4, Page No.

870-883

Wang et. al. 2007, ―A New Lightweight and Scalable Encryption Algorithm for

Streaming Video over Wireless Networks‖, International Conference on Wireless

Network, Page No. 180-185

Warhekar et. al., 2014, ―Implementing Mobile Multimedia Applications Using

Cloud Computing‖ International Journal Of Computer Science And Information

Technologies, Vol. 5 No. 1, Page No.230-232

Wiegand et. al., 2003, ―Overview of the H.264/AVC video coding standard‖, IEEE

Transactions Circuits Syst. Video Technol., Vol. 13, Page No. 560–576

Wolfgang et. al., 1999, ―Perceptual watermarks for digital images and video‖,

Proceedings of the IEEE, Vol. 87, Page No. 1108-1126

Wolfgang et al., 1997, "Overview of image security techniques with applications in

multimedia systems," Proceeding of the SPIE Conference on Multimedia Networks:

Security, Displays, Terminals, and Gateways, Vol. 3228, Page No. 297-308.

Wong et. Al. 2006, ―An efficient, parallel multikey encryption of compressed video

streams‖ The proceedings of International Conference on Signal and Image

Processing

Wu et. al., 2005, ―Design of Integrated Multimedia Compression and Encryption

Systems‖ IEEE Transactions On Multimedia, Vol. 7, No. 5 Page no. 828-839

Page 22: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

236

Wu et. al., 2013, ―Cloud MoV: Cloud-Based Mobile Social TV‖, IEEE Transactions

On Multimedia, Vol. 15,No. 4,

Xiong et. al., 2012, ―Towards End-to-End Secure Content Storage and Delivery with

Public Cloud‖ CODASPY’12, ACM 978-1-4503-1091-8

Xiuhui et. al., 2008, ―Research on Application of Immune Digital Watermark

Algorithm‖ IEEE Computer Society, International Conference on Computer Science

and Software Engineering, 978-0-7695-3336-0

Yang et. al., 2008, ―A video encryption method based on chaotic maps in DCT

domain‖ Progress in Natural Science Elsevier, Vol. 18 No. 1, Page No. 1299-1304

Yeo et. al., 2009, ―Cloud computing and emerging IT platforms: Vision, hype, and

reality for delivering computing as the 5th

utility. Future Generation Computer

Systems, Vol. 25, No. 6, Page No. 599–616

Yerawar et. al., 2014, ―Encryption and Watermarking Used To Secure Live Video‖,

World Research Journal of Human-Computer Interaction, Volume 1, No. 1 Page No.

01-03.

Yuan et. al. 2003, ―Efficient and Fully Sealable Encryption for MPEG-4 FGS‖, IEEE

Transaction, 0-7803-7761-3, Page No. 620-623

Zambreno et. al., 2013, ―Securing Multimedia Content using Joint Compression and

Encryption‖, Multimedia IEEE, Vol. 20, No. 4, Page No. 1-12

Zhang et. al., 2005, ―An image encryption approach based on chaotic maps‖ Chaos,

Solitons and Fractals, Elsevier, Vol. 24, Page No. 759–765

Zhang et. al. 2007, ―Robust Video Watermarking of H.264/AVC‖, IEEE

Transactions on Circuits and Systems—II: Express Briefs, Vol. 54, No. 2, Page No.

205-209

Zheng et. al., 2010, ―A measurement study on user behavior of p2p VoD system, in

'Informatics in Control, Automation and Robotics (CAR)‖, 2nd

International Asia

Conference on', Page No. 373-376

Page 23: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

237

Zhou et. al., 2014, ―Image Encryption Using Binary Bit Plane‖ Signal Processing

Elsevier, Vol. 00 No. 12, Page No. 1-25

Zhu et. al., 2013, ―Robust And Simple N-Party Entangled Authentication Cloud

Storage Protocol Based On Secret Sharing Scheme‖ Journal Of Information Hiding

And Multimedia Signal Processing, Vol. 4, No. 2, Page No. 110-118

Page 24: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

238

BIBLIOGRAPHY

Books Referred

Harris, 2007, SICCP Exam Guide, fourth edition, McGraw-Hall

Kessler, 1998, An Overview of Cryptography,

Sikora, "MPEG Digital Video Coding Standards", In Digital Electronics Consumer

Handbook, McGraw Hill Company,

Wang et. al., 2001, ―Video Processing and Communications‖ Prentice Hall, Signal

Processing Series

William, 2007, Network Security Essentials, applications and Standards , Pearson

Education, Inch.

White, 2003, Cisco Security+ Certification: Exam Guide, McGraw-Hill.

Articles Referred

Ali, 1999, ―Video compression: MPEG-4 and beyond‖ Retrieved from

http://www.cse.wustl.edu/~jain/cis788-99/compression/

David, 1980, ―Cryptology Goes Public‖, Communications Magazine, IEEE,

Diffie & Hellman, 1976, ―New Directions in Cryptography‖, IEEE Transactions On

Information Theory

E-line, 2011, ―Cloud Video Management‖ Article

Figliola et. al., 2014, ―Overview and Issues for Implementation of the Federal Cloud

Computing Initiative: Implications for Federal Information Technology Reform

Management‖, CRS Report

Page 25: REFERENCES - Shodhgangashodhganga.inflibnet.ac.in/bitstream/10603/29494/10/11...Hasan et. al., 2012, ―A New Color Image Watermarking Technique Using Hybrid Domain‖ International

239

Jarnikov et. al. 2014 ―A Watermarking System for Adaptive Streaming‖, white

paper, IRTEDO

Salah, 2003, ―A Light-Weight Encrypting For Real Time Video Transmission‖

Technical Report

Shoemaker, 2002 ―Hidden Bits: A Survey of Techniques for Digital Watermarking‖,

Independent Study

White Paper, 2008. An explanation of video compression techniques.

http://www.axis.com/corporate/corp/tech_papers.htm.